• DocumentCode
    708133
  • Title

    Active authentication using scrolling behaviors

  • Author

    El Masri, Alaa ; Wechsler, Harry ; Likarish, Peter ; Grayson, Christopher ; Pu, Calton ; Al-Arayed, Dalal ; Kang, Brent ByungHoon

  • Author_Institution
    Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
  • fYear
    2015
  • fDate
    7-9 April 2015
  • Firstpage
    257
  • Lastpage
    262
  • Abstract
    This paper addresses active authentication using scrolling behaviors for biometrics and assesses different classification and clustering methods that leverage those traits. The dataset used contained event-driven temporal data captured through monitoring users´ reading habits. The derived feature set is mainly composed of users´ scrolling events and their derivatives (changes) and 5-gram sequencing of scrolling events to increase the number of feature extracted and their context. Classification performance in terms of both accuracy and Area under the Curve (AUC) for Receiver Operating Characteristic (ROC) curve is first reported using several classification methods including Random Forests (RF), RF with SMOTE (for unbalanced dataset) and AdaBoost with Decision Stump and ADTree. The best performance was obtained, however, using k-means clustering with two methods used to authenticate users: simple ranking and profile standard error filtering, with the latter achieving a success rate of 83.5%. Our use of k-means represents a novel non-intrusive approach of active and continuous re-authentication to counter insider-threat. Our main contribution comes from the features considered and their coupling to k-means to create a novel state-of-the art active user re-authentication method.
  • Keywords
    biometrics (access control); feature extraction; learning (artificial intelligence); pattern classification; pattern clustering; ADTree; AUC; AdaBoost; RF; ROC curve; SMOTE; active authentication; area under the curve; biometrics; classification methods; continuous re-authentication; decision stump; event-driven temporal data; feature extraction; insider-threat; k-means clustering; profile standard error filtering; random forests; ranking; receiver operating characteristic; scrolling behaviors; scrolling events 5-gram sequencing; user reading habits monitoring; Authentication; Biometrics (access control); Feature extraction; Radio frequency; Standards; Support vector machines; Active authentication; AdaBoost; Behavioral Biometrics; Random Forests; SMOTE; k-means clustering;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information and Communication Systems (ICICS), 2015 6th International Conference on
  • Conference_Location
    Amman
  • Type

    conf

  • DOI
    10.1109/IACS.2015.7103185
  • Filename
    7103185